developing secure mobile applications for android

9
Developing Secure Mobile Applications for Android http://www.isecpartners.com/files/ iSEC_Securing_Android_Apps.pdf CS 595 James Zachary Howland

Upload: jane

Post on 23-Feb-2016

73 views

Category:

Documents


0 download

DESCRIPTION

Developing Secure Mobile Applications for Android. http://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf CS 595 James Zachary Howland. Background. Designed with security in mind Data sharing must be done explicitly Potentially harmful applications are limited by user - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Developing Secure Mobile Applications for Android

Developing Secure Mobile Applications for Android

http://www.isecpartners.com/files/iSEC_Securing_Android_Apps.pdf

CS 595James Zachary Howland

Page 2: Developing Secure Mobile Applications for Android

Background

• Designed with security in mind• Data sharing must be done explicitly• Potentially harmful applications are limited by

user• Every application is its own user• Applications are signed by developers• Uses manifest to specify permissions

Page 3: Developing Secure Mobile Applications for Android

Intents and Pending Intents

• What are Intents?• Bad Data and Intent Filters• Callbacks should probably use PendingIntents

Page 4: Developing Secure Mobile Applications for Android

Activities

• Allow code reuse• Intent Filter note• Security concerns

Page 5: Developing Secure Mobile Applications for Android

Broadcasts

• Allows components to communicate• Sensitive data• Sticky Broadcasts

Page 6: Developing Secure Mobile Applications for Android

Services

• Secure calls into Services

Page 7: Developing Secure Mobile Applications for Android

Content Providers and File Access

• Permission Style• Avoiding SQL Injection• Nothing should be world-writable• SD Card

Page 8: Developing Secure Mobile Applications for Android

Binders

• What are Binders?• Security

Page 9: Developing Secure Mobile Applications for Android

Conclusion

• Android developed with security in mind• Very specific methods for IPC• Keep It Simple